Search Results - (( java implication based algorithm ) OR ( stone detection packet algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    The optimization of stepping stone detection: packet capturing steps by Omar, Mohd. Nizam, Maarof, Mond. Aizaini, Zainal, Anazida

    Published 2006
    “…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    The optimization of stepping stone detection : packet capturing steps by Omar, Mohd. Nizam, Maarof, Mohd. Aizaini, Zainal, Anazida

    Published 2006
    “…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    The optimization of stepping stone detection: Packet capturing steps by Omar, Mohd Nizam, Maarof, Mohd Aizaini, Zainal, Anazida

    Published 2006
    “…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism.The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection and response system.The proposed method is to use small size of user buffer and kernel buffer.Experiments were conducted with two types of packet stream; i) 10 kbps and ii) 10 000 kbps data generated by Tfgen (packet generator) tools and nine combinations of different buffer sizes for each network packet stream were tested.Results from the experiment were analyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan by Omar, Mohd. Nizam

    Published 2005
    “…In this research, special Top-Down methodology has been used to optimize the stepping stone algorithm. It is achieved by analyzing five stepping stone algorithms, in which each algorithm is divided into three main parts. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6